new proof methods for attribute based encryption
play

New Proof Methods for Attribute-Based Encryption: Achieving Full - PowerPoint PPT Presentation

New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques Allison Lewko Brent Waters Roots of Attribute-Based Encryption Moving beyond Public Key Encryption: CEO Manager 1 Manager 2 Bob


  1. New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques Allison Lewko Brent Waters

  2. Roots of Attribute-Based Encryption Moving beyond Public Key Encryption: CEO Manager 1 Manager 2 “Bob” Alice employee employee Encrypt to “Bob” Individual + superiors Encrypt to Bob “users with hats” Hierarchical Identity-based Attribute-based Identity-based Encryption [S84,BF01,C01] Encryption [SW05] Encryption [HL02,GS02]

  3. Two Kinds of ABE Ciphertext Policy ABE: {A, C} (A Ç B) Æ C Key Policy ABE: (A Ç B) Æ C {A, C}

  4. Security Goal for ABE Public Params Challenger Attacker S 1 Repeat S 1 MSK M 0 , M 1 , Policy S i : set of attributes Enc(M b , PP, policy) S 2 Repeat S 2

  5. Proof Challenges  Hard problem ABE Hard problem ABE attacker Simulator breaks ABE Challenge: simulator must: • respond to key requests • leverage attacker’s success on challenge

  6. Partitioning Proofs Previous approach – Partitioning [BF01, BB04, W05, GPSW06] Key Space We Need: Key Request Keys Simulator Key Request Can Make Key Request Abort Can’t Make Challenge Abort Challenge

  7. Problem: Why Should Attacker Respect the Partition? Two Approaches: 1. Make Attacker Commit (weaker) selective security 2. Guess and quit when wrong HA!

  8. Selectively Secure ABE [GPSW06, W11] Selectively Secure KP-ABE [GPSW06]: Attribute set S Public Parameters Formulas NOT satisfied by S Satisfied Simulator by S

  9. Selectively Secure ABE [GPSW06, W11] Selectively Secure CP-ABE [W11]: Access Policy P Public Parameters Sets NOT satisfying P Simulator Satisfying P

  10. Dual System Encryption [W09] Normal Used in real system   Normal  Semi-Functional

  11. A Dual System Encryption Proof Hardest step previously done Real Security Game: Hybrid Argument: With info-theoretic argument - Efficiency drawbacks Not Compatible! M b Regardless of Compability! High probability decryption failure Incompatiblity of key/CT Message independent CT Decryption failure

  12. Dual System Encryption Reimagined Decompose: Parameters in S.F. Space “delayed” until Semi-functional Semi-functional first semi-functional component Space object appears! Normal Component Public Parameters Separated from PP Normal Space

  13. The Security Game in S.F. Space Public Params PP in S.F. Space S 1 Repeat M 0 , M 1 , policy Challenger Attacker Enc(M b , PP, policy) S i : sets of attributes S i Repeat

  14. Dividing the Proof: Two Cases Thought experiment: consider attacker requesting one key (generalize to many keys via hybrid argument) Case 1: CT request comes before key Access Policy P Sets NOT satisfying P challenger attacker Satisfying P Like selective CP-ABE! Semi-functional space

  15. Dividing the Proof: Two Cases Thought experiment: consider attacker requesting one key (generalize to many keys via hybrid argument) Case 2: key request comes before CT Set S Formulas NOT satisfied by S challenger attacker Satisfied by S Like selective KP-ABE! Semi-functional space

  16. Proof Schematic Timeline of Game -> Erase Message Partitioning proof Partitioning proof PP Key 1 Key 2 Key 3 Key 4 Key 5 Key 6 CT Expand into Expand into S.F. Space S.F. Space

  17. Summary of Techniques Selective security Selective security proof for KP-ABE proof for CP-ABE Dual System Encryption Fully Secure ABE

  18. Open Problems • Selectively secure CP-ABE from a non-“q-type” assumption ABE for more general policies (ideally, circuits) • - Progress to be reported later in this session

  19. Thanks for your attention! Questions?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend